RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Privacy protecting data collection in media spaces
Proceedings of the 12th annual ACM international conference on Multimedia
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Adversarial contention resolution for simple channels
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
RFID tags for ambient intelligence: present solutions and future challenges
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
Wireless identification -- privacy and security
BT Technology Journal
An Introduction to RFID Technology
IEEE Pervasive Computing
The Evolution of RFID Security
IEEE Pervasive Computing
Computer
RFID: The Next Serious Threat to Privacy
Ethics and Information Technology
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Protocols for RFID tag/reader authentication
Decision Support Systems
A platform for RFID security and privacy administration
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Contention resolution with heterogeneous job sizes
ESA'06 Proceedings of the 14th conference on Annual European Symposium - Volume 14
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
The future of radio frequency identification
Journal of Theoretical and Applied Electronic Commerce Research
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An anti-counterfeiting RFID privacy protection protocol
Journal of Computer Science and Technology
Supporting document management by using RFID technology
International Journal of Internet Protocol Technology
International Journal of Internet Protocol Technology
Radio Frequency Identification: a review of low cost tag security proposals
International Journal of Information and Computer Security
RFID tags: privacy and security aspects
International Journal of Mobile Communications
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
Managing RFID Consumer Privacy and Implementation Barriers
Information Systems Security
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
Computational Intelligence and Security
Low-Cost Authentication Protocol of the RFID System Using Partial ID
Computational Intelligence and Security
Security and Privacy on Authentication Protocol for Low-Cost RFID
Computational Intelligence and Security
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
A design automation and power estimation flow for RFID systems
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Proceedings of the 15th ACM conference on Computer and communications security
A cross-layer framework for privacy enhancement in RFID systems
Pervasive and Mobile Computing
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Performance-effective and low-complexity redundant reader detection in wireless RFID networks
EURASIP Journal on Wireless Communications and Networking - Intelligent Systems for Future Generation Wireless Networks
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
IEICE - Transactions on Information and Systems
IEICE - Transactions on Information and Systems
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
Privacy Protection for RFID with Hidden Subset Identifiers
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Short survey: Taxonomy and survey of RFID anti-collision protocols
Computer Communications
Engineering Applications of Artificial Intelligence
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
Securing wireless implantable devices for healthcare: ideas and challenges
IEEE Communications Magazine
A server centric authentication protocol for a RFID system
CASE'09 Proceedings of the fifth annual IEEE international conference on Automation science and engineering
Information Security Tech. Report
An overview of RFID tags and new cryptographic developments
Information Security Tech. Report
Key issues of RFID reader network system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Product control system using rfid tag information and data mining
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Multi-modal authentication for ubiquitous computing environments
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Efficient implementation of pseudorandom functions for electronic seal protection protocols
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Low-cost and strong-security RFID authentication protocol
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Java based software framework and its integration in mobile phones using RFID technologies
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
A hybrid tag number estimation scheme for aloha based anti-collision algorithm in RFID networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Anti-collision protocol for RFID-sensor network and the security threats
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Enhancing WLAN location privacy using mobile behavior
Expert Systems with Applications: An International Journal
WSEAS TRANSACTIONS on COMMUNICATIONS
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Classifying RFID attacks and defenses
Information Systems Frontiers
Revisiting unpredictability-based RFID privacy models
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Securing the use of RFID-enabled banknotes
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
An RFID secure authentication mechanism in WLAN
Computer Communications
Efficient RNTS system for privacy of banking off-line customer
The Journal of Supercomputing
A pairing based cryptographic anonymous authentication scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
Comprehensive protection of RFID traceability information systems using aggregate signatures
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
A New Specimen Management System Using RFID Technology
Journal of Medical Systems
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Low-Cost cryptography for privacy in RFID systems
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Design and implementation of crypto co-processor and its application to security systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Scalable and flexible privacy protection scheme for RFID systems
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Kallima: a tag-reader protocol for privacy enhanced RFID system
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A design of privacy conscious RFID system using customizing privacy policy based access control
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
WIPI mobile platform with secure service for mobile RFID network environment
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Vulnerability of an RFID authentication protocol proposed in at secubiq 2005
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Performance analysis of tag anti-collision algorithms for RFID systems
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Authorized tracking and tracing for RFID tags
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
QT-CBP: a new RFID tag anti-collision algorithm using collision bit positioning
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Resolving the semantic inconsistency problem for ubiquitous RFID applications
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Self re-encryption protocol providing strong privacy for low cost RFID system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Enabling secure secret updating for unidirectional key distribution in RFID-Enabled supply chains
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
BUPLE: securing passive RFID communication through physical layer enhancements
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Simple Lightweight Authentication Protocol: Security and Performance Considerations
International Journal of Business Data Communications and Networking
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
Countermeasures against sybil attacks in WSN based on proofs-of-work
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
Single tag sharing scheme for multiple-object RFID applications
Multimedia Tools and Applications
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Hi-index | 0.00 |
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive device intended as an "electronic bar-code" for use in supply-chain management, a blocker tag is a cheap passive RFID device that can simulate many ordinary RFID tags simultaneously. When carried by a consumer, a blocker tag thus "blocks" RFID readers. It can do so universally by simulating all possible RFID tags. Or a blocker tag can block selectively by simulating only selected subsets of ID codes, such as those by a particular manufacturer, or those in a designated "privacy zone.We believe that this approach, when used with appropriate care, provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use of RFID tags in consumer products.We also discuss possible abuses arising from blocker tags, and means for detecting and dealing with them.